Why does a fakechroot exist?


Login or Register for Dates, Times and to Reply

 
Thread Tools Search this Thread
Top Forums UNIX for Beginners Questions & Answers Why does a fakechroot exist?
# 8  
The process that chroot starts is a new process; it does not replace an existing process (and certainly does not replace PID 1 in the global zone).

You might be able to use chroot to start a non-global zone with an alternative root directory and have that affect all processes run in that zone, but I no longer have access to a system where I could verify whether or not that would work.
Login or Register for Dates, Times and to Reply

Previous Thread | Next Thread
Thread Tools Search this Thread
Search this Thread:
Advanced Search

Test Your Knowledge in Computers #871
Difficulty: Medium
Hello World in Lisp is coded as: [ print "Hello world" ]
True or False?

9 More Discussions You Might Find Interesting

1. Homework & Coursework Questions

Group Doesn't Exist

Use and complete the template provided. The entire template must be completed. If you don't, your post may be deleted! 1. The problem statement, all variables and given/known data: I'm able to create a group but when I'm trying to delete the group it keeps stating Group Doesn't Exist. I know... (2 Replies)
Discussion started by: GoBoyGo
2 Replies

2. Shell Programming and Scripting

Help: Backfile if backup does not exist

I am trying to work on a script that will first check to see if a backup of a file exists, and if it does it will prompt the user to ask if he/she wants it replace. Of course, if the user says no then the file should be skipped. Here is the code I have written. Does it look as if it is working... (1 Reply)
Discussion started by: xshellscriptx
1 Replies

3. UNIX for Dummies Questions & Answers

Does ${%name} exist in csh?

I have this code in tcsh and would like to know whether the syntax below will work in csh. if( "${%rsl}" == 0 ) then echo "rsl is empty" endif ---------- Post updated at 06:38 AM ---------- Previous update was at 05:53 AM ---------- It does not seem so. Perhaps the best thing is to... (2 Replies)
Discussion started by: kristinu
2 Replies

4. Shell Programming and Scripting

if pid exist ?

Hi I need help to whit a script that start a program if a nother program is started first . I thought something like this . if then start program 2 Thanks (4 Replies)
Discussion started by: pelle
4 Replies

5. Shell Programming and Scripting

Find out whether files exist.

I have the following data stored in a file. 1 /home/file13 /home/file2 2 /home/file41 /home/file654 3 /home/file61 /home/file45 4 /home/file81 /home/file43 ... I want to print the first column provided the files represented by the second and third column exist. How to do that? (3 Replies)
Discussion started by: kevintse
3 Replies

6. Shell Programming and Scripting

Group Exist Scripting

Hey People, I've got a question! How can i write a function in a script which is looking for if a group exist and if not, that the group "users" is the standard group..I know that i have to use "grep" und "if-else"..I will be very happy for answers ;) Greetz Ali (2 Replies)
Discussion started by: AliC
2 Replies

7. UNIX for Dummies Questions & Answers

testing if files exist

I am trying to test arguments to see if they are files in any directory. I have : but it's not working (7 Replies)
Discussion started by: skooly5
7 Replies

8. UNIX for Dummies Questions & Answers

su: user x does not exist

somehow my user names and groups on one of our machines are changed to numbers 700, 701, etc. thus, i can only ssh into this machine as root. is there a way to migrate the user names and groups to this machine? thanks! (3 Replies)
Discussion started by: user23
3 Replies

9. UNIX for Dummies Questions & Answers

does it exist in linux?

Is there a jumpstart equivalent tool in the linux environment? (1 Reply)
Discussion started by: pbonilla
1 Replies
secweb(1M)																secweb(1M)

NAME
secweb - invokes the HP-UX Auditing and Security Attributes Configuration tool SYNOPSIS
[ ] [ ] DESCRIPTION
The HP-UX Auditing and Security Attributes Configuration tool ( ) is used to configure suditing sub-system and, view and configure system- wide and per-user (Local users and NIS users) values of security attributes. It also gives information about account locks. The HP-UX Auditing and Security Attributes Configuration tool provides both Web-based and terminal user interface (for Security Attributes Configuration only). The Web-based interface is launched through the HP System Management Homepage. Superuser privileges are required to access the HP-UX Auditing and Security Attributes Configuration tool. A user who does not have supe- ruser privileges has read-only access to the System Defaults area in the HP-UX Auditing and Security Attributes Configuration tool and can- not modify or reset per-user values. The terminal user interface is invoked if any of the following conditions are true: o The command is invoked with option. o The environment variable is not set. The Web-based interface is launched if all the following conditions are true: o The command is invoked with option. o The environment variable is set. o The command is available on the system. If the Web-based interface cannot be launched, invokes the terminal user interface. Options recognizes the following options: Forces a client browser to be used in less secure ways. The option forces the client browser to be used or started, even when the X-traffic between the X-server and the Mozilla browser is not secure. Use this option only when you are sure the network traffic between the host where Mozilla is running and the host in the DISPLAY variable is secure. If cannot start the Web browser, the terminal interface is started. When the HP-UX Auditing and Security Attributes Configuration Web interface is invoked by SAM, the option is used. If a privileged user (root) executes the command with the option, a temporary login bypass key is generated. The bypass key enables the user to access the Web interface without having to provide login information again. When the HP-UX Auditing and Security Attributes Configuration Web interface is invoked by SAM, the option is used. Opens the terminal interface for setting system-wide and per-user values of security attributes regardless of the current setting of the environment variable. You can also start the HP-UX Auditing and Security Attributes Configuration tool using one of the following methods: o Invoke and select the Auditing and Security Attributes Configuration (character mode) functional area to launch the terminal user interface and the Auditing and Security Attributes Configuration (Web-based Interface) to launch the Web-based tool o Invoke the HP-UX Auditing and Security Attributes Configuration tool Web interface by typing the URL in the address bar of your browser, where hostname is the name of the server o Launch the HP-UX Systems Insight Manager on the server and select the Auditing and Security Attributes Configuration tool from Configure -> HP-UX Configuration menu Online Help After the HP-UX Auditing and Security Attributes Configuration tool is started, the online help provides details on how to use the tool. RETURN VALUES
Upon completion, secweb returns one of the following values: o 0 Successful o 1 An error occurred WARNINGS
o For increased security, paste the URL in your browser, click on the Tools menu in the menu bar, then the Auditing and Security Attributes Configuration functional area. o The default minimum values of the security attributes , , , and does not meet the requirements for passwd(1M) command. A password must contain at least two letters and at least one numeric or special character. It is recommended to change the default values in for the above mentioned security attributes as per passwd(1M) requirements. For more information on password construction requirements, refer passwd(1M). AUTHOR
was developed by Hewlett-Packard Company. SEE ALSO
sam(1M), security(4), userdb(4) secweb(1M)

Featured Tech Videos